168d75effSDimitry Andric //===-- linux.cpp -----------------------------------------------*- C++ -*-===// 268d75effSDimitry Andric // 368d75effSDimitry Andric // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. 468d75effSDimitry Andric // See https://llvm.org/LICENSE.txt for license information. 568d75effSDimitry Andric // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception 668d75effSDimitry Andric // 768d75effSDimitry Andric //===----------------------------------------------------------------------===// 868d75effSDimitry Andric 968d75effSDimitry Andric #include "platform.h" 1068d75effSDimitry Andric 1168d75effSDimitry Andric #if SCUDO_LINUX 1268d75effSDimitry Andric 1368d75effSDimitry Andric #include "common.h" 1468d75effSDimitry Andric #include "linux.h" 1568d75effSDimitry Andric #include "mutex.h" 1668d75effSDimitry Andric #include "string_utils.h" 1768d75effSDimitry Andric 1868d75effSDimitry Andric #include <errno.h> 1968d75effSDimitry Andric #include <fcntl.h> 2068d75effSDimitry Andric #include <linux/futex.h> 2168d75effSDimitry Andric #include <sched.h> 2268d75effSDimitry Andric #include <stdlib.h> 2368d75effSDimitry Andric #include <string.h> 2468d75effSDimitry Andric #include <sys/mman.h> 2568d75effSDimitry Andric #include <sys/stat.h> 2668d75effSDimitry Andric #include <sys/syscall.h> 2768d75effSDimitry Andric #include <sys/time.h> 2868d75effSDimitry Andric #include <time.h> 2968d75effSDimitry Andric #include <unistd.h> 3068d75effSDimitry Andric 3168d75effSDimitry Andric #if SCUDO_ANDROID 3268d75effSDimitry Andric #include <sys/prctl.h> 3368d75effSDimitry Andric // Definitions of prctl arguments to set a vma name in Android kernels. 3468d75effSDimitry Andric #define ANDROID_PR_SET_VMA 0x53564d41 3568d75effSDimitry Andric #define ANDROID_PR_SET_VMA_ANON_NAME 0 3668d75effSDimitry Andric #endif 3768d75effSDimitry Andric 3868d75effSDimitry Andric namespace scudo { 3968d75effSDimitry Andric 4068d75effSDimitry Andric uptr getPageSize() { return static_cast<uptr>(sysconf(_SC_PAGESIZE)); } 4168d75effSDimitry Andric 4268d75effSDimitry Andric void NORETURN die() { abort(); } 4368d75effSDimitry Andric 4468d75effSDimitry Andric void *map(void *Addr, uptr Size, UNUSED const char *Name, uptr Flags, 4568d75effSDimitry Andric UNUSED MapPlatformData *Data) { 4668d75effSDimitry Andric int MmapFlags = MAP_PRIVATE | MAP_ANONYMOUS; 4768d75effSDimitry Andric int MmapProt; 4868d75effSDimitry Andric if (Flags & MAP_NOACCESS) { 4968d75effSDimitry Andric MmapFlags |= MAP_NORESERVE; 5068d75effSDimitry Andric MmapProt = PROT_NONE; 5168d75effSDimitry Andric } else { 5268d75effSDimitry Andric MmapProt = PROT_READ | PROT_WRITE; 53*fe6060f1SDimitry Andric } 54e8d8bef9SDimitry Andric #if defined(__aarch64__) 55e8d8bef9SDimitry Andric #ifndef PROT_MTE 56e8d8bef9SDimitry Andric #define PROT_MTE 0x20 57e8d8bef9SDimitry Andric #endif 585ffd83dbSDimitry Andric if (Flags & MAP_MEMTAG) 595ffd83dbSDimitry Andric MmapProt |= PROT_MTE; 605ffd83dbSDimitry Andric #endif 61*fe6060f1SDimitry Andric if (Addr) 6268d75effSDimitry Andric MmapFlags |= MAP_FIXED; 6368d75effSDimitry Andric void *P = mmap(Addr, Size, MmapProt, MmapFlags, -1, 0); 6468d75effSDimitry Andric if (P == MAP_FAILED) { 6568d75effSDimitry Andric if (!(Flags & MAP_ALLOWNOMEM) || errno != ENOMEM) 66*fe6060f1SDimitry Andric dieOnMapUnmapError(errno == ENOMEM ? Size : 0); 6768d75effSDimitry Andric return nullptr; 6868d75effSDimitry Andric } 6968d75effSDimitry Andric #if SCUDO_ANDROID 70*fe6060f1SDimitry Andric if (Name) 7168d75effSDimitry Andric prctl(ANDROID_PR_SET_VMA, ANDROID_PR_SET_VMA_ANON_NAME, P, Size, Name); 7268d75effSDimitry Andric #endif 7368d75effSDimitry Andric return P; 7468d75effSDimitry Andric } 7568d75effSDimitry Andric 7668d75effSDimitry Andric void unmap(void *Addr, uptr Size, UNUSED uptr Flags, 7768d75effSDimitry Andric UNUSED MapPlatformData *Data) { 7868d75effSDimitry Andric if (munmap(Addr, Size) != 0) 7968d75effSDimitry Andric dieOnMapUnmapError(); 8068d75effSDimitry Andric } 8168d75effSDimitry Andric 82*fe6060f1SDimitry Andric void setMemoryPermission(uptr Addr, uptr Size, uptr Flags, 83*fe6060f1SDimitry Andric UNUSED MapPlatformData *Data) { 84*fe6060f1SDimitry Andric int Prot = (Flags & MAP_NOACCESS) ? PROT_NONE : (PROT_READ | PROT_WRITE); 85*fe6060f1SDimitry Andric if (mprotect(reinterpret_cast<void *>(Addr), Size, Prot) != 0) 86*fe6060f1SDimitry Andric dieOnMapUnmapError(); 87*fe6060f1SDimitry Andric } 88*fe6060f1SDimitry Andric 8968d75effSDimitry Andric void releasePagesToOS(uptr BaseAddress, uptr Offset, uptr Size, 9068d75effSDimitry Andric UNUSED MapPlatformData *Data) { 9168d75effSDimitry Andric void *Addr = reinterpret_cast<void *>(BaseAddress + Offset); 92*fe6060f1SDimitry Andric 9368d75effSDimitry Andric while (madvise(Addr, Size, MADV_DONTNEED) == -1 && errno == EAGAIN) { 9468d75effSDimitry Andric } 9568d75effSDimitry Andric } 9668d75effSDimitry Andric 9768d75effSDimitry Andric // Calling getenv should be fine (c)(tm) at any time. 9868d75effSDimitry Andric const char *getEnv(const char *Name) { return getenv(Name); } 9968d75effSDimitry Andric 10068d75effSDimitry Andric namespace { 10168d75effSDimitry Andric enum State : u32 { Unlocked = 0, Locked = 1, Sleeping = 2 }; 10268d75effSDimitry Andric } 10368d75effSDimitry Andric 10468d75effSDimitry Andric bool HybridMutex::tryLock() { 10568d75effSDimitry Andric return atomic_compare_exchange(&M, Unlocked, Locked) == Unlocked; 10668d75effSDimitry Andric } 10768d75effSDimitry Andric 10868d75effSDimitry Andric // The following is based on https://akkadia.org/drepper/futex.pdf. 10968d75effSDimitry Andric void HybridMutex::lockSlow() { 11068d75effSDimitry Andric u32 V = atomic_compare_exchange(&M, Unlocked, Locked); 11168d75effSDimitry Andric if (V == Unlocked) 11268d75effSDimitry Andric return; 11368d75effSDimitry Andric if (V != Sleeping) 11468d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 11568d75effSDimitry Andric while (V != Unlocked) { 11668d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAIT_PRIVATE, Sleeping, 11768d75effSDimitry Andric nullptr, nullptr, 0); 11868d75effSDimitry Andric V = atomic_exchange(&M, Sleeping, memory_order_acquire); 11968d75effSDimitry Andric } 12068d75effSDimitry Andric } 12168d75effSDimitry Andric 12268d75effSDimitry Andric void HybridMutex::unlock() { 12368d75effSDimitry Andric if (atomic_fetch_sub(&M, 1U, memory_order_release) != Locked) { 12468d75effSDimitry Andric atomic_store(&M, Unlocked, memory_order_release); 12568d75effSDimitry Andric syscall(SYS_futex, reinterpret_cast<uptr>(&M), FUTEX_WAKE_PRIVATE, 1, 12668d75effSDimitry Andric nullptr, nullptr, 0); 12768d75effSDimitry Andric } 12868d75effSDimitry Andric } 12968d75effSDimitry Andric 13068d75effSDimitry Andric u64 getMonotonicTime() { 13168d75effSDimitry Andric timespec TS; 13268d75effSDimitry Andric clock_gettime(CLOCK_MONOTONIC, &TS); 13368d75effSDimitry Andric return static_cast<u64>(TS.tv_sec) * (1000ULL * 1000 * 1000) + 13468d75effSDimitry Andric static_cast<u64>(TS.tv_nsec); 13568d75effSDimitry Andric } 13668d75effSDimitry Andric 13768d75effSDimitry Andric u32 getNumberOfCPUs() { 13868d75effSDimitry Andric cpu_set_t CPUs; 1395ffd83dbSDimitry Andric // sched_getaffinity can fail for a variety of legitimate reasons (lack of 1405ffd83dbSDimitry Andric // CAP_SYS_NICE, syscall filtering, etc), in which case we shall return 0. 1415ffd83dbSDimitry Andric if (sched_getaffinity(0, sizeof(cpu_set_t), &CPUs) != 0) 1425ffd83dbSDimitry Andric return 0; 14368d75effSDimitry Andric return static_cast<u32>(CPU_COUNT(&CPUs)); 14468d75effSDimitry Andric } 14568d75effSDimitry Andric 1465ffd83dbSDimitry Andric u32 getThreadID() { 1475ffd83dbSDimitry Andric #if SCUDO_ANDROID 1485ffd83dbSDimitry Andric return static_cast<u32>(gettid()); 1495ffd83dbSDimitry Andric #else 1505ffd83dbSDimitry Andric return static_cast<u32>(syscall(SYS_gettid)); 1515ffd83dbSDimitry Andric #endif 1525ffd83dbSDimitry Andric } 1535ffd83dbSDimitry Andric 15468d75effSDimitry Andric // Blocking is possibly unused if the getrandom block is not compiled in. 15568d75effSDimitry Andric bool getRandom(void *Buffer, uptr Length, UNUSED bool Blocking) { 15668d75effSDimitry Andric if (!Buffer || !Length || Length > MaxRandomLength) 15768d75effSDimitry Andric return false; 15868d75effSDimitry Andric ssize_t ReadBytes; 15968d75effSDimitry Andric #if defined(SYS_getrandom) 16068d75effSDimitry Andric #if !defined(GRND_NONBLOCK) 16168d75effSDimitry Andric #define GRND_NONBLOCK 1 16268d75effSDimitry Andric #endif 16368d75effSDimitry Andric // Up to 256 bytes, getrandom will not be interrupted. 16468d75effSDimitry Andric ReadBytes = 16568d75effSDimitry Andric syscall(SYS_getrandom, Buffer, Length, Blocking ? 0 : GRND_NONBLOCK); 16668d75effSDimitry Andric if (ReadBytes == static_cast<ssize_t>(Length)) 16768d75effSDimitry Andric return true; 16868d75effSDimitry Andric #endif // defined(SYS_getrandom) 16968d75effSDimitry Andric // Up to 256 bytes, a read off /dev/urandom will not be interrupted. 17068d75effSDimitry Andric // Blocking is moot here, O_NONBLOCK has no effect when opening /dev/urandom. 17168d75effSDimitry Andric const int FileDesc = open("/dev/urandom", O_RDONLY); 17268d75effSDimitry Andric if (FileDesc == -1) 17368d75effSDimitry Andric return false; 17468d75effSDimitry Andric ReadBytes = read(FileDesc, Buffer, Length); 17568d75effSDimitry Andric close(FileDesc); 17668d75effSDimitry Andric return (ReadBytes == static_cast<ssize_t>(Length)); 17768d75effSDimitry Andric } 17868d75effSDimitry Andric 1795ffd83dbSDimitry Andric // Allocation free syslog-like API. 1805ffd83dbSDimitry Andric extern "C" WEAK int async_safe_write_log(int pri, const char *tag, 1815ffd83dbSDimitry Andric const char *msg); 1825ffd83dbSDimitry Andric 18368d75effSDimitry Andric void outputRaw(const char *Buffer) { 1845ffd83dbSDimitry Andric if (&async_safe_write_log) { 1855ffd83dbSDimitry Andric constexpr s32 AndroidLogInfo = 4; 1865ffd83dbSDimitry Andric constexpr uptr MaxLength = 1024U; 1875ffd83dbSDimitry Andric char LocalBuffer[MaxLength]; 1885ffd83dbSDimitry Andric while (strlen(Buffer) > MaxLength) { 1895ffd83dbSDimitry Andric uptr P; 1905ffd83dbSDimitry Andric for (P = MaxLength - 1; P > 0; P--) { 1915ffd83dbSDimitry Andric if (Buffer[P] == '\n') { 1925ffd83dbSDimitry Andric memcpy(LocalBuffer, Buffer, P); 1935ffd83dbSDimitry Andric LocalBuffer[P] = '\0'; 1945ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", LocalBuffer); 1955ffd83dbSDimitry Andric Buffer = &Buffer[P + 1]; 1965ffd83dbSDimitry Andric break; 1975ffd83dbSDimitry Andric } 1985ffd83dbSDimitry Andric } 1995ffd83dbSDimitry Andric // If no newline was found, just log the buffer. 2005ffd83dbSDimitry Andric if (P == 0) 2015ffd83dbSDimitry Andric break; 2025ffd83dbSDimitry Andric } 2035ffd83dbSDimitry Andric async_safe_write_log(AndroidLogInfo, "scudo", Buffer); 2045ffd83dbSDimitry Andric } else { 205e8d8bef9SDimitry Andric (void)write(2, Buffer, strlen(Buffer)); 20668d75effSDimitry Andric } 2075ffd83dbSDimitry Andric } 20868d75effSDimitry Andric 20968d75effSDimitry Andric extern "C" WEAK void android_set_abort_message(const char *); 21068d75effSDimitry Andric 21168d75effSDimitry Andric void setAbortMessage(const char *Message) { 21268d75effSDimitry Andric if (&android_set_abort_message) 21368d75effSDimitry Andric android_set_abort_message(Message); 21468d75effSDimitry Andric } 21568d75effSDimitry Andric 21668d75effSDimitry Andric } // namespace scudo 21768d75effSDimitry Andric 21868d75effSDimitry Andric #endif // SCUDO_LINUX 219